Most students will be familiar with resume and job services (monster.com, etc.)

Napster is a good example

Look at the Canadian Privacy Legislation at http://www.privcom.gc.ca/ Look at responsibilities of Canadian organizations over the next few years

Should computer systems be used to identify potential terrorists? Select potential job applicants? What are the issues of profiling?

Transcript of "102 Chapter 4 Pt 2"

1.
Chapter 5: SOCIAL, POLITICAL AND ETHICAL ISSUES IN THE INFORMATION AGE Part 2

2.
Moral Dimensions of IS: 1. Information Rights <ul><li>PRIVACY: The claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or government. </li></ul>

6.
2. Intellectual Property (IP) (continued) <ul><li>TRADE SECRET: </li></ul><ul><ul><li>Intellectual work or product used for a business purpose, not based on information in public domain </li></ul></ul><ul><ul><li>Employees asked to sign nondisclosure agreements </li></ul></ul><ul><ul><li>May include software with unique elements </li></ul></ul><ul><ul><li>(continued . . .) </li></ul></ul>

10.
Moral Dimensions of IS: 3. Accountability, Liability & Control <ul><li>ETHICAL ISSUES: </li></ul><ul><ul><li>Who is morally responsible for consequences of the use of Information Technologies? </li></ul></ul><ul><ul><li>What liability should be assumed by user? Provider? </li></ul></ul><ul><li>SOCIAL ISSUES: </li></ul><ul><ul><li>What should society expect and allow? </li></ul></ul><ul><li>POLITICAL ISSUES: </li></ul><ul><ul><li>To what extent should government intervene, protect? </li></ul></ul>

11.
Moral Dimensions of IS: 4. System Quality <ul><li>ETHICAL ISSUES: When is software or service ready for release? </li></ul><ul><li>SOCIAL ISSUES: Can people trust quality of software, services, data? </li></ul><ul><li>POLITICAL ISSUES: Should industry associations develop standards for software, hardware, data quality? </li></ul>What is an acceptable, technologically feasible level of system quality?

13.
Computer Crime & Abuse <ul><li>Computer Crime & Abuse </li></ul><ul><ul><li>Crime : Illegal acts through use of computer system or against a computer system </li></ul></ul><ul><ul><li>Abuse: Acts involving a computer that may not be illegal, but are unethical </li></ul></ul><ul><ul><li>Hackers/crackers </li></ul></ul><ul><ul><li>Jamming, sniffing, spoofing </li></ul></ul><ul><ul><li>Malicious software </li></ul></ul>

15.
Management Action: A Corporate Code of Ethics <ul><li>An IS-specific set of ethical standards for each of the five moral dimensions </li></ul><ul><ul><li>Information rights (e.g. workplace monitoring, email privacy, customer info policy) </li></ul></ul><ul><ul><li>Property Rights (e.g. software licenses) </li></ul></ul><ul><ul><li>Accountability & Control (e.g. specify individual who is responsible for aspects of i.s.) </li></ul></ul><ul><ul><li>Systems quality (e.g. levels of data and system quality allowed) </li></ul></ul><ul><ul><li>Quality of life (e.g. specify that systems should improve quality of life of stakeholders) </li></ul></ul>